First published: Sun Sep 21 2014(Updated: )
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.17.2 | |
Red Hat Enterprise Linux | =5.0 | |
Ubuntu Linux | =12.04 | |
Debian GNU/Linux | =7.0 | |
openSUSE Evergreen | =11.4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <=3.17.2 | |
Debian | =7.0 | |
Evergreen ILS | =11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3646 is a high severity vulnerability that can lead to denial of service due to guest OS crashes.
To fix CVE-2014-3646, upgrade to an unaffected kernel version such as 5.10.223-1 or 6.12.12-1.
CVE-2014-3646 affects various Linux distributions, including specific versions of Debian, Ubuntu, and Red Hat Enterprise Linux.
CVE-2014-3646 is caused by the KVM subsystem failing to handle the INVVPID instruction, which allows crashes of guest operating systems.
Yes, CVE-2014-3646 can be exploited by users within the guest OS to crash that OS through a crafted application.